Five Star Restaurant Reservations <= 2.7.16 - Unauthenticated Payment Bypass via PHP Type Juggling in 'payment_id' Parameter
The Five Star Restaurant Reservations plugin for WordPress is vulnerable to a payment bypass via PHP type juggling in versions up to, and including, 2.7.16 This is due to the valid_payment() function using a PHP loose comparison (==) between the attacker-controlled payment_id POST parameter and the booking's stripe_payment_intent_id property. When an unauthenticated attacker submits a request to the nopriv AJAX handler rtb_stripe_pmt_succeed before the Stripe payment intent has been created for a booking (i.e., before the JavaScript-triggered create_stripe_pmtIntnt() call has stored an intent ID in post meta), the stripe_payment_intent_id property on the booking object remains null. The comparison sanitize_text_field('') == null evaluates to TRUE in PHP loose comparison, causing the payment verification check to pass with zero actual payment. This makes it possible for unauthenticated attackers to mark any existing payment_pending booking as paid without completing a Stripe payment by submitting an empty payment_id parameter.
CVE-2026-6498 is a medium severity with CVSS 5.3 Vulnerability issue affecting the Plugin Five Star Restaurant Reservations – WordPress Booking Plugin. It affects Versions up to 2.7.16 and is fixed in 2.7.17.
CVE-2026-6498 is tracked for the Plugin Five Star Restaurant Reservations – WordPress Booking Plugin as medium severity with CVSS 5.3. The affected range is Versions up to 2.7.16. Update Five Star Restaurant Reservations – WordPress Booking Plugin to 2.7.17 or newer where that version is compatible with the site.
| Software Type | Plugin |
|---|---|
| Software Slug |
restaurant-reservations
View on wordpress.org
|
| CVE | CVE-2026-6498 |
| Patched Versions |
2.7.17
|
| Affected Versions |
Versions up to 2.7.16
|
Related CVEs for Five Star Restaurant Reservations – WordPress Booking Plugin
These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.
Five Star Restaurant Reservations <= 2.4.11 - Missing Authorization to Stored Cross-Site Scripting
Five Star Restaurant Reservations <= 2.4.7 - Subscriber+ Stored Cross-Site Scripting
Five Star Restaurant Reservations – WordPress Booking Plugin <= 2.7.5 - Unauthenticated Stored Cross-Site Scripting
Five Star Restaurant Reservations <= 2.6.7 - Reflected Cross-Site Scripting
Five Star Restaurant Reservations – WordPress Booking Plugin <= 2.7.9 - Missing Authorization
Five Star Restaurant Reservations <= 2.7.4 - Unauthenticated Insecure Direct Object Reference
Five Star Restaurant Reservations <= 2.7.8 - Cross-Site Request Forgery
Five Star Restaurant Reservations <= 2.6.29 - Missing Authorization
This record contains material that is subject to copyright
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more
License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more